Empirical Research for Software Security Empirical Research for Software Security
Series in Security, Privacy and Trust

Empirical Research for Software Security

Foundations and Experience

Lotfi Ben Othmane and Others
    • $84.99
    • $84.99

Publisher Description

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.

GENRE
Computers & Internet
RELEASED
2017
November 28
LANGUAGE
EN
English
LENGTH
322
Pages
PUBLISHER
CRC Press
SELLER
Taylor & Francis Group
SIZE
3.6
MB
Quality of Information and Communications Technology Quality of Information and Communications Technology
2022
Quality of Information and Communications Technology Quality of Information and Communications Technology
2020
Quality of Information and Communications Technology Quality of Information and Communications Technology
2019
Requirements Engineering: Foundation for Software Quality Requirements Engineering: Foundation for Software Quality
2019
Software Quality: Methods and Tools for Better Software and Systems Software Quality: Methods and Tools for Better Software and Systems
2018
Quality of Information and Communications Technology Quality of Information and Communications Technology
2021
Botnets Botnets
2019
Real-World Electronic Voting Real-World Electronic Voting
2016
Intrusion Detection and Prevention for Mobile Ecosystems Intrusion Detection and Prevention for Mobile Ecosystems
2017
Location Privacy in Wireless Sensor Networks Location Privacy in Wireless Sensor Networks
2016
Protecting Mobile Networks and Devices Protecting Mobile Networks and Devices
2016